Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Konstantinos Demertzis, Lazaros S. Iliadis |
Evolving Smart URL Filter in a Zone-Based Policy Firewall for Detecting Algorithmically Generated Malicious Domains. |
SLDS |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
Automated and Optimized FDD-Based Method to Fix Firewall Misconfigurations. |
NCA |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac |
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. |
ACIS |
2015 |
DBLP BibTeX RDF |
|
15 | Hailu Tegenaw, Mesfin Kifle |
Application aware firewall architecture to enhance performance of enterprise network. |
AFRICON |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Wenli Shang, Ming Wan, Peng Zeng 0001, Quansheng Qiao |
Research on self-learning method on generation and optimization of industrial firewall rules. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Simon N. Foley, Ultan Neville |
A firewall algebra for OpenStack. |
CNS |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Lin Zhang, Mengxing Huang |
A Firewall Rules Optimized Model Based on Service-Grouping. |
IEEE WISA |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Cornelius Diekmann, Lars Hupel, Georg Carle |
Semantics-Preserving Simplification of Real-World Firewall Rule Sets. |
FM |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Michael LeMay, Carl A. Gunter |
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. |
Logic, Rewriting, and Concurrency |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Ferney A. Maldonado-Lopez, Eusebi Calle, Yezid Donoso |
Detection and prevention of firewall-rule conflicts on software-defined networking. |
RNDM@WMNC |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Haining Chen, Omar Chowdhury, Jing Chen 0005, Ninghui Li, Robert W. Proctor |
Towards quantification of firewall policy complexity. |
HotSoS |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Zhenfang Wang, ZhiHui Lu 0002, Jie Wu 0003, Kang Fan |
CPFirewall: A Novel Parallel Firewall Scheme for FWaaS in the Cloud Environment. |
APSCC |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Dennis Appelt, Cu Duy Nguyen, Lionel C. Briand |
Behind an Application Firewall, Are We Safe from SQL Injection Attacks? |
ICST |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Fouad Amine Guenane |
Network security management using a novel firewall Cloud-based service. |
CFIP/NOTERE |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Jozef Filipek, Ladislav Hudec |
Distributed firewall using PKI in mobile Ad Hoc networks. |
CompSysTech |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham 0001 |
A Study of Web Application Firewall Solutions. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Tomokazu Otsuka, Gada, Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin |
Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System. |
COMPSAC Workshops |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Thuy Vinh Tran, Heejune Ahn |
A network topology-aware selectively distributed firewall control in SDN. |
ICTC |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Kazunori Kamiya, Kazufumi Aoki, Kensuke Nakata, Toru Sato, Hiroshi Kurakami, Masaki Tanikawa |
The method of detecting malware-infected hosts analyzing firewall and proxy logs. |
APSITT |
2015 |
DBLP DOI BibTeX RDF |
|
15 | A. Fairuzullah, Ahmad Noraziah, Wan Maseri Binti Wan Mohd, Tutut Herawan |
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall. |
DaEng |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Simeon Miteff, Scott Hazelhurst |
NFShunt: A Linux firewall with OpenFlow-enabled hardware bypass. |
NFV-SDN |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner |
Towards Standardising Firewall Reporting. |
CyberICS/WOS-CPS@ESORICS |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Ladislav Balik, Josef Horalek, Ondrej Hornig, Vladimir Sobeslav, Rafael Dolezal, Kamil Kuca |
Endpoint Firewall for Local Security Hardening in Academic Research Environment. |
ICCCI (2) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Kangshun Li, Zhichao Wen |
The Privacy Protection Search of Spam Firewall. |
ISICA |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Burkhard Wiegel |
Securing Enterprise Email Communication on both Sides of the Firewall. |
ISSE |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Ruud Koolen, Julien Schmaltz |
Formal Methods for MILS: Formalisations of the GWV Firewall. |
MILS@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Yong Hu, Daniel Müller-Gritschneder, Martha Johanna Sepúlveda, Guy Gogniat, Ulf Schlichtmann |
Automatic ILP-based Firewall Insertion for Secure Application-Specific Networks-on-Chip. |
INA-OCMC@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah |
Portable Toolkit for Penetration Testing and Firewall Configuration. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Om Prakash Patel, Aruna Tiwari, Vikram Patel, Ojas Gupta |
Quantum Based Neural Network Classifier and Its Application for Firewall to Detect Malicious Web Request. |
SSCI |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Miltos D. Grammatikakis, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Marcello Coppola |
High-level security services based on a hardware NoC Firewall module. |
WISES |
2015 |
DBLP BibTeX RDF |
|
15 | Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson |
Examining How the Great Firewall Discovers Hidden Circumvention Servers. |
Internet Measurement Conference |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan |
Dynamic rule and rule-field optimisation for improving firewall performance and security. |
IET Inf. Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim, Soon-Young Jung |
Practical firewall policy inspection using anomaly detection and its visualization. |
Multim. Tools Appl. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Zubair Nabi |
A $35 Firewall for the Developing World. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
15 | Michael LeMay, Carl A. Gunter |
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
15 | Roya Ensafi, Philipp Winter, Abdullah Mueen 0001, Jedidiah R. Crandall |
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
15 | Xiangjian He, Thawatchai Chomsiri, Priyadarsi Nanda, Zhiyuan Tan 0001 |
Improving cloud network security using the Tree-Rule firewall. |
Future Gener. Comput. Syst. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak |
Firewall Policy Reconnaissance: Techniques and Analysis. |
IEEE Trans. Inf. Forensics Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Harsh Taneja, Angela Xiao Wu |
Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior. |
Inf. Soc. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Wei-Ming Chen, Hsin-Hung Chiang, Kai-Di Chang, Han-Chieh Chao, Jiann-Liang Chen |
Backup routing firewall mechanism in P2P environment. |
Peer-to-Peer Netw. Appl. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Qinghua Yang, Yu Liu |
What's on the other side of the great firewall? Chinese Web users' motivations for bypassing the Internet censorship. |
Comput. Hum. Behav. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ehab Al-Shaer |
Automated Firewall Analytics - Design, Configuration and Optimization |
|
2014 |
DOI RDF |
|
15 | Ashok Singh Sairam, Rahul Kumar, Pratima Biswas |
Implementation of an Adaptive Traffic-aware Firewall. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio |
Mignis: A Semantic Based Tool for Firewall Configuration. |
CSF |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Meng Liu 0010, Wan-Chun Dou, Shui Yu 0001, Zhensheng Zhang |
A clusterized firewall framework for cloud computing. |
ICC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Casimer M. DeCusatis, Peter Mueller |
Virtual Firewall Performance as a Waypoint on a Software Defined Overlay Network. |
HPCC/CSS/ICESS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Hammad Kabir, Raimo Kantola, Jesus Llorente Santos |
Security Mechanisms for a Cooperative Firewall. |
HPCC/CSS/ICESS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Miltos D. Grammatikakis, Kyprianos Papadimitriou, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Ioannis Christoforakis, Marcello Coppola |
Security Effectiveness and a Hardware Firewall for MPSoCs. |
HPCC/CSS/ICESS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao 0001 |
Towards a Reliable SDN Firewall. |
ONS |
2014 |
DBLP BibTeX RDF |
|
15 | Zeyad S. Aaber, Richard M. Crowder, Victor I. Chang 0001, Nawfal F. Fadhel, Gary B. Wills |
Towards a Framework for Securing a Document outside an Organisational Firewall. |
CloudCom |
2014 |
DBLP DOI BibTeX RDF |
|
15 | |
Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. |
FOCI |
2014 |
DBLP BibTeX RDF |
|
15 | Byoung-Koo Kim, Dong-Ho Kang, Jung-Chan Na, Beom-Hwan Chang, Tai-Myoung Chung |
Design of Industrial Firewall System Based on Multiple Access Control Filter. |
FCC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks. |
FCC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad M. Masud 0001, Umniya Mustafa, Zouheir Trabelsi |
A data driven firewall for faster packet filtering. |
COMNET |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi |
A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ehab S. Elmallah, Mohamed G. Gouda |
Hardness of Firewall Analysis. |
NETYS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sebastian Biedermann, Jakub Szefer |
SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. |
ISC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Dirk Achenbach, Jörn Müller-Quade, Jochen Rill |
Universally Composable Firewall Architectures Using Trusted Hardware. |
BalkanCryptSec |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Umniya Mustafa |
A Web-based Firewall Simulator Tool for Information Security Education. |
ACE |
2014 |
DBLP BibTeX RDF |
|
15 | Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan 0001 |
A Stateful Mechanism for the Tree-Rule Firewall. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad Ghoniem, Georgiy Shurkhovetskyy, Ahmed Bahey, Benoît Otjacques |
VAFLE: visual analytics of firewall log events. |
Visualization and Data Analysis |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Marco Cereia, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano |
Latency evaluation of a firewall for industrial networks based on the Tofino Industrial Security Solution. |
ETFA |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yihuan Xing, Ford-Long Wong, Akash Kumar 0001 |
Lightweight Bare-Metal Stateful Firewall. |
PRDC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
Formal approach for managing firewall misconfigurations. |
RCIS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Nguyen Manh Hung, Vu Duy Nhat |
B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule. |
CISDA |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sven Hager, Frank Winkler, Björn Scheuermann 0001, Klaus Reinhardt |
MPFC: Massively Parallel Firewall Circuits. |
LCN |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Stephan Windmüller |
Simplifying Firewall Setups by Using Offline Validation. |
J. Integr. Des. Process. Sci. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim |
Database Security System for Applying Sophisticated Access Control via Database Firewall Server. |
Comput. Informatics |
2013 |
DBLP BibTeX RDF |
|
15 | Kristián Valentín, Michal Malý |
Network Firewall using Artificial Neural Networks. |
Comput. Informatics |
2013 |
DBLP BibTeX RDF |
|
15 | Qi Duan, Ehab Al-Shaer |
Traffic-aware dynamic firewall policy management: techniques and applications. |
IEEE Commun. Mag. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Leonardo Maccari, Renato Lo Cigno |
Waterwall: a cooperative, distributed firewall for wireless mesh networks. |
EURASIP J. Wirel. Commun. Netw. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Fei Chen 0001, Bezawada Bruhadeshwar, Alex X. Liu |
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization. |
IEEE/ACM Trans. Netw. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Harsh Taneja, Angela Xiao Wu |
Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain web user behavior. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
15 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot |
Management of stateful firewall misconfiguration. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan, Kilani Ghoudi |
Dynamic traffic awareness statistical model for firewall performance enhancement. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Kasom Koht-Arsa, Surasak Sanguanpong |
A Centralized State Repository Approach to Highly Scalable and High-Availability Parallel Firewall. |
J. Comput. |
2013 |
DBLP BibTeX RDF |
|
15 | Sylvain Hallé, Eric Lunaud Ngoupe, Roger Villemaire, Omar Cherkaoui |
Distributed firewall anomaly detection through LTL model checking. |
IM |
2013 |
DBLP BibTeX RDF |
|
15 | David Goergen, Thibault Cholez, Jérôme François, Thomas Engel 0001 |
A semantic firewall for Content-Centric Networking. |
IM |
2013 |
DBLP BibTeX RDF |
|
15 | Miguel Garcia, Nuno Ferreira Neves, Alysson Bessani |
An intrusion-tolerant firewall design for protecting SIEM systems. |
DSN Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer |
Objective metrics for firewall security: A holistic view. |
CNS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Robert Benner, Victor T. E. Echeverria, Uzoma Onunkwo, Jay Patel, David Zage |
Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions. |
ICNC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ondrej Rysavý, Jaroslav Ráb, Miroslav Svéda |
Improving security in SCADA systems through firewall policy analysis. |
FedCSIS |
2013 |
DBLP BibTeX RDF |
|
15 | Achim D. Brucker, Lukas Brügger, Burkhart Wolff |
hol-TestGen/fw - An Environment for Specification-Based Firewall Conformance Testing. |
ICTAC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Wei Li 0025, Haishan Wan, Sheng Li |
An approach to the generalization of firewall rules. |
ICIS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Shui Yu 0001, Robin Doss, Wanlei Zhou 0001, Song Guo 0001 |
A general cloud firewall framework with dynamic resource allocation. |
ICC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan, Sudhanshu Raghuwanshi |
Securing Networks Using Situation-Based Firewall Policy Computations. |
ICACNI |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Umniya Mustafa, Mohammad M. Masud 0001, Zouheir Trabelsi, Timothy Wood 0001, Zainab Al Harthi |
Firewall performance optimization using data mining techniques. |
IWCMC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Heba A. Kurdi, Madeeha Enazi, Auhood Abdullah Alfaries |
Evaluating Firewall Models for Hybrid Clouds. |
EMS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Abdul Razzaq, Ali Hur, Sidra Shahbaz, Muddassar Masood, Hafiz Farooq Ahmad |
Critical analysis on web application firewall solutions. |
ISADS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Juan Wang 0006, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng |
Towards a Security-Enhanced Firewall Application for OpenFlow Networks. |
CSS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci |
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jun Long, Luda Wang, Zude Li |
Research and design of the firewall penetration technology serving to distributed cloud resource. |
Internetware |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Hyeonwoo Kim, Wooguil Pak, Hongtaek Ju |
Correlation analysis between inference accuracy and inference parameters for stateless firewall policy. |
APNOMS |
2013 |
DBLP BibTeX RDF |
|
15 | Pritom Rajkhowa, Shyamanta M. Hazarika, Guillermo Ricardo Simari |
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration. |
QSHINE |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Sandeep Reddy Pedditi, Du Zhang, Chung-E. Wang |
FIEP: An initial design of a firewall information exchange protocol. |
IRI |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Seungjoon Lee, Manish Purohit, Barna Saha |
Firewall placement in cloud data centers. |
SoCC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Yan Xu, Zhaoxia Wei, Qingrong Tang |
Efficient Algorithm for Detecting Firewall Rule Conflict. |
INCoS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Erkan Ozhan |
Güvenlik duvarı günlüklerinin makine öğrenmesi yöntemleri ile analizi ve bir model çıkartılması (The analysis of the firewall diaries through machine learning methods and producing a model) |
|
2013 |
RDF |
|
15 | Annie Shebanow, Richard Perez, Caroline Howard |
The Effect of Firewall Testing Types on Cloud Security Policies. |
Int. J. Strateg. Inf. Technol. Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Rabiu Mukhtar, Ameer Al-Nemrat, Mamoun Alazab, Sitalakshmi Venkatraman, Hamid Jahankhani |
Analysis of firewall log-based detection scenarios for evidence in digital forensics. |
Int. J. Electron. Secur. Digit. Forensics |
2012 |
DBLP DOI BibTeX RDF |
|